Botnet masters hide command and control server inside the Tor network

Security researchers from German antivirus vendor G Data Software have identified a botnet that is controlled by attackers from an Internet Relay Chat (IRC) server running as a hidden service inside the Tor anonymity network.

This strategy offers several advantages to the botnet's operators, but also some disadvantages, the G Data researchers said Monday in a blog post.

For one, the botnet command and control server can't be easily shut down by researchers or law enforcement because its very hard to determine its real location,

The Tor system was specifically designed to provide anonymity for its users. When using Tor to access resources on the Internet, the requests sent from a user's computer are routed randomly through a series of nodes operated voluntarily by other Tor users.

In addition, the connections between users and the Tor nodes is encrypted in a multi-layered fashion, making it very hard for surveillance systems that operate at the local network level or the ISP level to determine the intended destination of a user.

Another benefit of using Tor for controlling malware infected computers is that the traffic cannot be easily blocked by intrusion detection systems, the G Data researchers said.

Intrusion detection systems commonly use signatures to identify traffic that is generated by infected computers present on the network. These signatures often look at the traffic's destination or its actual content. Because Tor traffic doesn't directly point to known malicious destinations and its content is encrypted, it's hard to flag it as malicious.

Tor's Hidden Service Protocol allows people to run various types of services, such as websites or instant messaging servers, which can only be accessed from within the Tor network. These Tor services are accessible through a .onion address and not a real IP address, which makes them anonymous.

While the Tor network was built for legitimate purposes like protecting user privacy by preventing network-level surveillance, it does offer an opportunity for abuse. For example, the hidden service functionality of the Tor network was used in the past to host an online marketplace for illegal drugs.

The possibility of using the Tor network to host resilient botnet command and control servers has been discussed before. Dennis Brown, a security engineer at Tenable Network Security, discussed the strengths and weaknesses of this approach during a talk at the DefCon 18 security conference back in 2010.

"It has to be noted that malware like this suffers from the latencies that come with the Tor network," the G Data researchers said. "In other words: Tor tends to be slow and unreliable, and inherits these flaws to underlying botnets."

Brand Pages

Slideshows

ARN kicks off awards season in 2020 with Judges' Lunch

ARN kick-started its 2020 awards season with its annual Judges’ Lunch in Sydney on 13 March, welcoming current and new judges to the panel. The judges came together in recognition of their involvement in this year's ARN Innovation Awards and Women in ICT Awards programs, both of which honour outstanding achievements by individuals and organisations in the IT channel industry. Photos by Ashley Mar.​

In pictures: Nextgen Leadership Forum and Summer Party 2020

Nextgen Distribution held its second Leadership Forum in conjunction with its latest annual Summer Party event on 13 February in Sydney. Drawing upon the theme, 'leading through adversity with diversity,' the Leadership Forum featured keynotes and panellists including NSW Rural Fire Service Commissioner Shane Fitzsimmons; former Governor-General and Chief of the Defence Force Peter Cosgrove; Micro Focus A/NZ managing director Peter Fuller; and Vocus CEO Kevin Russell, among others, discussing leadership in adversity and diversity leadership. Photos by Kwa Nguyen.​

Driving value within the modern workplace

This roundtable, held in association with Vocus and hosted by GenNet, examined why modern collaboration platforms are essential in today’s workplace and discussed how one such platform, Microsoft Teams, can deliver the functionality to meet the needs of the modern enterprise.

Related Whitepapers

Copyright 2020 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.